Transcription

1 P/N: CD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services CD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services (hereinafter referred to as CeMOS/Cedar Cloud Services) is the essence of Cedar Industrial Handheld Computers, they provide over 25,000 software packages that are required by Cedar Industrial Handheld Computers, for system installation, software updates and adding new softwares. Users can link to the CeMOS/Cedar Cloud Server anytime anywhere to get the software packages support services immediately. Users do not have to worry about the problem of the network information security, because CeMOS/Cedar Cloud Services take strict security controls and the four stage software package release management mechanism to ensure the security and reliability of the software packages. CeMOS/Cedar Cloud Services furthermore offer user friendly interfaces for browsing, searching, downloading, installing, updating and removing the software packages, which enhances the effectiveness. CeMOS/Cedar Cloud Services are parts of the four main parts of Cedar Industrial Handheld Computer System Development Platform, and the other parts are Cedar Industrial Handheld Computer Development Kit, Cedar Industrial Handheld Computer PC Emulator, and CeMOS/Cedar Industrial Handheld Computer Operating System. The purpose of Cedar Industrial Handheld Computer System Development Platform is to help developing, testing and validating the customized Cedar Industrial Handheld Computer quickly.

2 2 Product Features Over 25,000 Software Packages CeMOS/Cedar Cloud Server provides over 25,000 software packages for users to download and install. These software packages include system softwares and application softwares. CeMOS/Cedar Cloud Services also offer software update service to the users after the purchase of Cedar Industrial Handheld Computer, adding value to the product continuously. The number of the software packages and the functions of each software package in the CeMOS/Cedar Cloud Server will be increased continuously and frequently to satisfy the users' needs. Mechanism of Security Control CeMOS/Cedar Cloud Services take strict security control mechanism, to protect users from the network information security risk. CeMOS/Cedar Cloud Services authenticate the identity of developers, verify the uploaded software packages are clean and original, make sure that users connect to the correct server, and verify the software packages downloaded and the one uploaded are identical. Four Stage Software Release Management (Experimental Stage, Unstable Stage, Testing Stage, and Stable Stage) The software release management of CeMOS/Cedar Cloud Services, ensure that the software packages downloaded by the users have passed functionality test, performance test, dependency test, compatibility test, and reliability test. Therefore the utilization of Cedar Industrial Handheld Computers is stable and reliable. Cloud Service Whenever the users have new needs for the Cedar Industrial Handheld Computer, they can connect the Cedar Industrial Handheld Computer to the CeMOS/Cedar Cloud Server anytime anywhere, to get the required support service. Software Package Management CeMOS/Cedar Software Package Management offers user friendly interfaces to browse, search, download, install, update and remove the software packages, enabling the users to utilize the software and hardware resources of Cedar Industrial Handheld Computers more effectively.

4 4 Manage Software Packages in the Command Mode by Console Users can also manage the software packages in the command mode. All users need to do is open the console and enter the aptitude command, and users can browse, search, download, install, update, and remove software packages. CeMOS/Cedar Cloud Server Security Control Mechanism To prevent the CeMOS/Cedar Cloud Server from malicious intrusion, malwares and spreading computer virus to users, CeMOS/Cedar Cloud Server adopts strict security control mechanism. CeMOS/Cedar Cloud Services utilize Gnu Privacy Guard (GnuPG) encryption/decryption technology, MD5, SHA1 and SHA256 code verification technology. Even slight changes made in any files can cause a totally different hash code. That helps maintaining the safety of all the software packages in the CeMOS/Cedar Cloud Server, protecting users from exposing to any possible network information security risk. In the process of developer uploading a software package, the developer encrypts the software package's control file with his/her private key firstly; the CeMOS/Cedar Cloud Server has the public keys of all the authenticated developers, after CeMOS/Cedar Cloud Server has verified the control file with the developer's public

5 key successfully, CeMOS/Cedar Cloud Server checks each file in the software package with the respective MD5, SHA1, or SHA256 hash codes retrieved from the control file. After the CeMOS/Cedar Cloud Server has confirmed the uploaded software package as clean and original, the software package is saved to the CeMOS/Cedar Cloud Server. These steps guarantee the safety of the software packages in the CeMOS/Cedar Cloud Server. CeMOS/Cedar Cloud Server uses the private key representing the CES release manager to encrypt the release file, and the CES release manager publishes the corresponding public key to the users of CeMOS/Cedar Cloud Server. The users download the release file from the CeMOS/Cedar Cloud Server, and use the public key to decrypt the release file. The next step, the users verify the release file, finding out the location and the hash codes of the software package catalog file from the release file. After downloading the software package catalog file and verifying it, users can further access the location and hash codes of the software package; then downloading the software package and verifying it, now the users can install the software package. 5 The release file downloaded from the CeMOS/Cedar Cloud Server, containing the location and hash codes of the software package catalog files. The GnuPG signature of the release file.

6 6 The software package catalog file contains the location and hash codes of the software packages. After downloading the software package and verifying the file, users can install the software package. The Categories of the Software Packages in the CeMOS/Cedar Cloud Server The updates and expansion of the Cedar Industrial Handheld Computer come from the software packages in the CeMOS/Cedar Cloud Server, therefore the contents of the software packages in the CeMOS/Cedar Cloud Server are the essence of the Cedar Industrial Handheld Computers. There are over 25,000 software packages in the CeMOS/Cedar Cloud Server, including not only system softwares but also application softwares. System softwares are, for example, kernels, administration utilities, communication programs, X window system softwares, shells, desktop environments, etc. Application softwares are, for example, graphics packages, text editors, programming languages, libraries, libraries for development, database, font packages, audio and video packages, language packages, science softwares, mathematics softwares, etc. Detailed documentation of each software package is also provided for users' reference. With rapid advancement of computer technology, we will continue dedicating ourselves to developing and expanding the software packages in the CeMOS/Cedar Cloud Server, and providing ongoing value added services for the users of Cedar Handheld Computers.

7 7 CeMOS/Cedar Cloud Server Software Package Release Management CeMOS/Cedar Cloud Server provides over 25,000 software packages for the users of Cedar Industrial Handheld Computers to download. While installing the Cedar Industrial Handheld Computer for the first time, the installation program of CeMOS/Cedar Industrial Handheld Computer Operating System will download and install the required software packages from the CeMOS/Cedar Cloud Server automatically, including the necessary system software packages such as the kernel, operating system, X window system, and desktop environment. After system software packages are installed, users can download and install additional software packages from the CeMOS/Cedar Cloud Server via Synaptic Package Manager or the aptitude command. To ensure each of the software packages of the Cedar Industrial Handheld Computer is able to work stably without compatibility problems and dependency problems, any possible combinations of the 25,000 software packages in the CeMOS/Cedar Cloud Server must undergo rigorous functionality, performance, dependency and compatibility testing before the official release of a stable version of the software packages. Each software package in the CeMOS/Cedar Cloud Server may retain one to four different versions, which are belong to the experimental suite, the unstable suite, the testing suite, or the stable suite respectively. The experimental suite focuses on the functionality and performance testing, and the unstable suite focuses on the compatibility testing. The testing suite focuses on the reliability testing, and the stable suite focuses on the stable release. Each of the software packages released by the CeMOS/Cedar Cloud Server must go through the experimental stage, the unstable stage, the testing stage, stage by stage, finally come to the stable stage, and released officially. Ordering Information CeMOS/Cedar Cloud Services are included in Cedar Industrial Handheld Computer System Development Platform. You don't need to order extra CeMOS/Cedar Cloud Services, since Cedar Industrial Handheld Computer System Development Platform itself contains CeMOS/Cedar Cloud Services. CD310 Cedar Industrial Handheld Computer System Development Platform includes: 1. CD310 1 Cedar Industrial Handheld Computer Development Kit 2. CD310 2 Cedar Industrial Handheld Computer PC Emulator 3. CD110 CeMOS/Cedar Industrial Handheld Computer Operating System 4. CD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services

Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.

A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional You Will Learn About the features and architecture of Windows XP How to install Windows

WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from

White Paper Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools Introduction The modern workforce is on the hunt for tools that help them get stuff done. When the technology

Kaspersky Whitelisting Database Test A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: February 14 th, 2013, last update: April 4 th, 2013 Summary During November 2012

How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook

Virtual Data Room From Deal Making to Due Diligence Built with the leading Investment Banks and Law Firms, our revolutionary technology is used by tens of thousands of professionals all over the world.

FTP 4 ANDROID ABSTRACT In this project we propose FTP 4 ANDROID, a new app to store the days in FTP servers. Nowadays it is common practice to handle any type of file with the personal computer. The introduction

COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their

How did Wiki Leaks happen? A disgruntled employee with an agenda goes to work with USB flash drives and copies restricted files off of the server. There is no adequate secure network access and identity

Digital signature in insecure environments Janne Varjus Helsinki University of Technology jvarjus@cc.hut.fi Abstract Due to current legislation the digital signatures can be as valid as the hand written

WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities

Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

CyberLink PowerDVD Mobile User's Guide Copyright and Disclaimer All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means

Computing Guide THE LIBRARY www.salford.ac.uk/library How to set up McAfee virus scanning software and become computer virus savvy A virus infection of your workstation can seriously disrupt your learning,

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.

SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form

UIT USpace Flexible and Secure File Manager for Cloud Storage USpace File Manager for Cloud Storage Main features: USpace is a cloud storage solution which is very suitable for both private cloud deployment

What are Docs & Drive? Docs Use Google Docs, Sheets and Slides for document editing anywhere, anytime. Google Docs is an online word processor that lets you create and format text documents and collaborate

Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

USING SSL/TLS WITH TERMINAL EMULATION This document describes how to install and configure SSL or TLS support and verification certificates for the Wavelink Terminal Emulation (TE) Client. SSL/TLS support

IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

Lizenzbestimmungen für Windows Server 2003 Windows Server 2003, Web Edition (PL) appropriate number of PLs, you may use the Server Software with up to two (2) processors of a Server at any one time. Usage

WildFire Cloud File Analysis The following topics describe the different methods for sending files to the WildFire Cloud for analysis. Forward Files to the WildFire Cloud Verify Firewall File Forwarding

The Gitcon Access Management Software Installation Guide is a publication of Kaba Mas LLC (hereinafter Kaba Mas). No part of this book may be reproduced or transmitted in any form or by any means, electronic

Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.

The Triple Play Analysis Suite - DATA The Triple Play Analysis Suite - Data are meant for emulating the client s application such as FTP downloading or Web Browser testing at the termination point of DSL

Hosting and Cloud Services Customer Service Level Agreement (SLA) Welcome to the Clustered Cloud Hosted Services Community. We are happy to have you aboard and look forward to assisting you with all your

Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

It s Who You Don t Know GM To Think About PHP Distributed Encryption What is an acceptable level of massmarket encryption? How does the average joe fingerprint and protect their daily communication? What

Data Storage That Looks at Business the Way You Do. Up. cloud Now integrating enterprise information and business processes is as simple as a click or a swipe. Konica Minolta s FileAssist solution provides

Page 1 of 7 Cute_FTP Server Names and Authentication Before connecting to an FTP site you need three pieces of information: the server name or the site you are connecting to and a user name and password.

Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman

Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions